A company has a corporate infrastructure where end users manage their own certificate keys. Which of the following is considered the MOST secure way to handle master keys associated with these certificates?

A. Key escrow with key recovery
B. Trusted first party
C. Personal Identity Verification
D. Trusted third party


Answer: A. Key escrow with key recovery

Computer Science & Information Technology

You might also like to view...

What does the Label control display as a default when used in a form or report?

A) "Label" B) Label name C) Caption set for a field if there is one D) Default value for the field if there is one

Computer Science & Information Technology

When recording a macro, the Record Macro command stores the macro in a(n):

A) event. B) sub event. C) module. D) file.

Computer Science & Information Technology

Perform research on the Internet to learn about trends in wireless networking, and typical costs involved in the installation of a wireless LAN.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Year by year the cost of computer systems continues to rise. 2. Processors are so inexpensive that we now have microprocessors we throw away. 3. Workstation systems cannot support highly sophisticated engineering and scientific applications. 4. The IAS is the prototype of all subsequent general-purpose computers.

Computer Science & Information Technology